咨询与建议

限定检索结果

文献类型

  • 3,962 篇 会议
  • 2,035 篇 期刊文献
  • 78 册 图书

馆藏范围

  • 6,075 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,747 篇 工学
    • 3,007 篇 计算机科学与技术...
    • 2,468 篇 软件工程
    • 744 篇 信息与通信工程
    • 505 篇 控制科学与工程
    • 416 篇 生物工程
    • 327 篇 电气工程
    • 264 篇 生物医学工程(可授...
    • 228 篇 机械工程
    • 222 篇 电子科学与技术(可...
    • 189 篇 光学工程
    • 139 篇 网络空间安全
    • 135 篇 安全科学与工程
    • 129 篇 化学工程与技术
    • 127 篇 动力工程及工程热...
    • 125 篇 仪器科学与技术
    • 117 篇 交通运输工程
  • 1,690 篇 理学
    • 959 篇 数学
    • 450 篇 生物学
    • 366 篇 物理学
    • 303 篇 统计学(可授理学、...
    • 196 篇 系统科学
    • 146 篇 化学
  • 1,133 篇 管理学
    • 702 篇 管理科学与工程(可...
    • 495 篇 图书情报与档案管...
    • 324 篇 工商管理
  • 226 篇 医学
    • 200 篇 临床医学
    • 186 篇 基础医学(可授医学...
  • 158 篇 法学
    • 118 篇 社会学
  • 136 篇 教育学
    • 132 篇 教育学
  • 125 篇 经济学
    • 124 篇 应用经济学
  • 44 篇 农学
  • 18 篇 军事学
  • 15 篇 艺术学
  • 14 篇 文学
  • 1 篇 哲学

主题

  • 232 篇 software enginee...
  • 170 篇 computational mo...
  • 148 篇 feature extracti...
  • 139 篇 training
  • 137 篇 semantics
  • 122 篇 deep learning
  • 111 篇 software
  • 110 篇 computer science
  • 110 篇 accuracy
  • 109 篇 machine learning
  • 102 篇 data models
  • 94 篇 cloud computing
  • 89 篇 computer archite...
  • 85 篇 predictive model...
  • 83 篇 data mining
  • 83 篇 security
  • 80 篇 quality of servi...
  • 75 篇 optimization
  • 72 篇 internet of thin...
  • 71 篇 visualization

机构

  • 229 篇 college of compu...
  • 100 篇 national enginee...
  • 71 篇 department of co...
  • 71 篇 state key labora...
  • 68 篇 shanghai key lab...
  • 56 篇 institute of com...
  • 54 篇 school of inform...
  • 53 篇 department of co...
  • 53 篇 college of intel...
  • 50 篇 school of big da...
  • 50 篇 software enginee...
  • 50 篇 school of softwa...
  • 48 篇 shanghai key lab...
  • 47 篇 school of comput...
  • 44 篇 tianjin key labo...
  • 38 篇 school of comput...
  • 36 篇 school of softwa...
  • 35 篇 university of ch...
  • 35 篇 state key labora...
  • 33 篇 school of comput...

作者

  • 54 篇 rajkumar buyya
  • 46 篇 shen linlin
  • 33 篇 hung chih-cheng
  • 28 篇 buyya rajkumar
  • 27 篇 xu yuanping
  • 26 篇 ismail leila
  • 25 篇 zuohua ding
  • 24 篇 yuanping xu
  • 23 篇 zhang lei
  • 23 篇 jin jin
  • 23 篇 xu zhijie
  • 22 篇 huibiao zhu
  • 21 篇 chaolong zhang
  • 21 篇 wang xiaofei
  • 21 篇 leung victor c.m...
  • 20 篇 zhu huibiao
  • 20 篇 qi liu
  • 20 篇 tao dacheng
  • 20 篇 ding zuohua
  • 19 篇 victor c. m. leu...

语言

  • 5,377 篇 英文
  • 653 篇 其他
  • 58 篇 中文
  • 3 篇 德文
  • 1 篇 朝鲜文
检索条件"机构=Computing and Software Engineering"
6075 条 记 录,以下是1071-1080 订阅
排序:
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dynamic Multimodal Optimzation
A Surrogate-Assisted Evolutionary Algorithm for Expensive Dy...
收藏 引用
Congress on Evolutionary Computation
作者: Xunfeng Wu Songbai Liu Junkai Ji Lijia Ma Victor C. M. Leung College of Computer Science and Software Engineering Shenzhen University Shenzhen China National Engineering Laboratory for Big Data System Computing Technology Shenzhen University Shenzhen China Department of Electrical and Computer Engineering The University of British Columbia Vancouver Canada
Surrogate-assisted evolutionary algorithms (SAEAs) have demonstrated promising optimization performance in addressing expensive dynamic optimization problems or expensive multimodal optimization problems. However, non... 详细信息
来源: 评论
The Impact of Transformer Models and Regression Algorithms on Automated Short Answer Grading  5
The Impact of Transformer Models and Regression Algorithms o...
收藏 引用
5th IEEE International Conference on Advances in Electrical, computing, Communication and Sustainable Technologies, ICAECT 2025
作者: Nampoothiri, Abhijith. N. Thushara, M.G. Pradeesh, N. Anand Krishna, K.R. Santhosh, Abhai Abhijith Kumar, S. Kumar, Suryan Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Applications Amritapuri India Amrita School of Computing Amrita Vishwa Vidyapeetham Department of Computer Science and Engineering Amritapuri India Omnex Software Solutions Pvt. Ltd Thoraipakkam Chennai India
Grading short answer questions in higher education often poses significant challenges due to its subjective nature and time-consuming process. As educational institutions expand, the need for efficient and objective g... 详细信息
来源: 评论
Sensor-Based Authentication on Smartphones via Integrating Auxiliary Information
Sensor-Based Authentication on Smartphones via Integrating A...
收藏 引用
IEEE International Conference on Systems, Man and Cybernetics
作者: Yingjie Wang Ruimin Hu National Engineering Research Center for Multimedia Software Wuhan University Whuhan China Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education School of Cyber Science and Engineering Wuhan University Whuhan China
With the widespread use of smartphones, more and more private information is stored on the phone, and the loss or theft of the phone can lead to data leakage, theft of property, and other problems. Traditional active ... 详细信息
来源: 评论
EagerLog: Active Learning Enhanced Retrieval Augmented Generation for Log-based Anomaly Detection
EagerLog: Active Learning Enhanced Retrieval Augmented Gener...
收藏 引用
International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
作者: Chiming Duan Tong Jia Yong Yang Guiyang Liu Jinbu Liu Huxing Zhang Qi Zhou Ying Li Gang Huang School of Software and Microelectronics Peking University Beijing China Institute for Artificial Intelligence Peking University Beijing China National Key Laboratory of Data Space Technology and System Beijing China National Engineering Research Center for Software Engineering Peking University Beijing China Alibaba Cloud Computing Company Hangzhou China
Logs record essential information about system operations and serve as a critical source for anomaly detection, which has generated growing research interest. Utilizing large language models (LLMs) within a retrieval-... 详细信息
来源: 评论
Research on Optimization of Nuclear Power Security DCS Gateway Encryption Communication Based on OPC UA Protocol  9th
Research on Optimization of Nuclear Power Security DCS Gatew...
收藏 引用
9th International Conference on Energy engineering and Environmental engineering, ICEEEE 2022
作者: Zhou, Pengjun Chen, Zhi Jiang, Wei Liu, Jie Zhang, Yan Zhong, Ke Wu, Zhiqiang School of Computer Science University of South China Hengyang421200 China Nuclear Power Institute of China Chengdu610000 China Intelligent Equipment Software Evaluation Engineering Technology Research Center of Hunan Hengyang China CNNC Key Laboratory on High Trusted Computing Hunan Hengyang China
Nuclear power safety grade DCS gateway is an important hub for information transmission between safety grade equipment and non-safety grade equipment, and its security is very important in the transmission process. At... 详细信息
来源: 评论
An Innovative Study on the Detection of Foreign Objects in Electric Wires
An Innovative Study on the Detection of Foreign Objects in E...
收藏 引用
Artificial Intelligence, Networking and Information Technology (AINIT), International Seminar on
作者: Fangyu Hu Haoyu Sun Junhao Zhang Yuhui Li School of Software Harbin Institute of Technology Harbin China Faculty of Computing Harbin Institute of Technology Harbin China School of Automotive Engineering Harbin Institute of Technology Harbin China
With the development of modern society, the demand for electricity consumption is also gradually increasing, timely power inspection, the removal of foreign bodies at the power line is very important. Aiming at the pr... 详细信息
来源: 评论
SYSTEMATIC LITERATURE REVIEW ON APPLICATION OF LEARNING-BASED APPROACHES IN CONTINUOUS INTEGRATION
arXiv
收藏 引用
arXiv 2024年
作者: Arani, Ali Kazemi Le, Triet Huynh Minh Zahedi, Mansooreh Babar, M. Ali CREST-The Centre for Research on Engineering Software Technologies University of Adelaide AdelaideSA5005 Australia School of Computing and Information Systems University of Melbourne MelbourneVIC3010 Australia
Context: Machine learning (ML) and deep learning (DL) analyze raw data to extract valuable insights in specific phases. The rise of continuous practices in software projects emphasizes automating Continuous Integratio... 详细信息
来源: 评论
How Far Have Edge Clouds Gone? A Spatial-Temporal Analysis of Edge Network Latency In the Wild  31
How Far Have Edge Clouds Gone? A Spatial-Temporal Analysis o...
收藏 引用
31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023
作者: Zhang, Heng Huang, Shaoyuan Xu, Mengwei Guo, Deke Wang, Xiaofei Leung, Victor C.M. Wang, Wenyu College of Intelligence and Computing Tianjin University Tianjin China Beijing University of Posts and Telecommunications Beijing China College of Computer Science and Software Engineering Shenzhen University Shenzhen China The University of British Columbia Department of Electrical and Computer Engineering VancouverV6T 1Z4 Canada Co. Ltd Shanghai China
The emergence of next-generation latency-critical applications places strict requirements on network latency and stability. Edge cloud, an instantiated paradigm for edge computing, is gaining more and more attention d... 详细信息
来源: 评论
A Composite Schema Matching Method Based on Contrastive Learning in Data Integration
A Composite Schema Matching Method Based on Contrastive Lear...
收藏 引用
International Conference on Computer Supported Cooperative Work in Design
作者: Liying Shao Xinyu Hao Jian-tao Zhou Ministry of Education Inner Mongolia Engineering Laboratory for Cloud Computing and Service Software Inner Mongolia Engineering Laboratory for Big Data Analysis Technology College of Computer Science Inner Mongolia University Engineering Research Center of Ecological Big Data Hohhot China
Schema matching is a crucial step in data integration for in-depth information mining, aimed at capturing seman-tic correspondences between elements of multi-source datasets. The existing schema matching methods still... 详细信息
来源: 评论
A Workflow for the Continuous Deployment of Quantum Services
A Workflow for the Continuous Deployment of Quantum Services
收藏 引用
software Services engineering (SSE) IEEE International Conference on
作者: Javier Romero-Alvarez Jaime Alvarado-Valiente Enrique Moguel Jose Garcia-Alonso Juan M. Murillo Quercus Software Engineering Group Universidad de Extremadura Cáceres Spain Computing and Advanced Technologies Foundation of Extremadura Cáceres Spain
The rapid advancements in quantum computing have opened new possibilities for solving complex problems in various fields, including cryptography, optimization, and simulation. However, the current approaches to quantu...
来源: 评论